Professional Documents
Culture Documents
Network Engineer Exam Ans
Network Engineer Exam Ans
Network Engineer Exam Ans
Ans. Considering the size or span of a network, we can classify them as follows:
PAN (Personal Area Network) – PAN is made up of devices used by a single person. It has
a range of a few meters.
WPAN (Wireless Personal Area Network) – It is a PAN network that uses wireless
technologies as a medium.
LAN (Local Area Network) – LAN is a network whose range is limited to a relatively small
area, such as a room, a building, an aeroplane, etc.
WLAN (Wireless Local Area Network) – WLAN is a LAN network that uses wireless
means of communication. It is a widely used configuration due to its scalability and
because it does not require the installation of cables.
CAN (Campus Area Network) – A network of high-speed devices that connects LANs in a
limited geographical area, such as a university campus, a military base, etc.
MAN (Metropolitan Area Network) – MAN is a high-speed (broadband) network
providing coverage in a larger geographic area than a campus, but still limited.
WAN (Wide Area Network) – WAN extends over a large geographical area using unusual
means of communication, such as satellites, interoceanic cables, fibre optics, etc. Use
public media.
VLAN – It is a type of logical or virtual LAN, mounted on a physical network, in order to
increase security and performance. In special cases, thanks to the 802.11Q protocol (also
called QinQ), it is possible to mount virtual networks on WAN networks. It is important
not to confuse this implementation with VPN technology.
You can also explore – What is the Difference Between LAN and WAN?
Ans. Network cables can connect two computers or computer systems directly. A cable is a cord that
is made up of different conductors, which are insulated from each other. This cord is usually
protected by a wrap for better strength and flexibility.
To choose a network cable, several aspects must be taken into account such as –
The distance that must be covered with that cable
The maximum data transmission speed
The coating of the cable
The type of network to be created
The type of braiding, shielding, and/or sheath
Q4. What are the different types of network cables used in networking?
Utilizes different servers with Resolves reverse lookup queries where a client
different IP addresses requests a hostname by providing an IP address
You must explore: What are the Different Types of Network Topology?
Star – In the star network topology, there is a central computer or server to which all workstations
are directly connected. Each workstation is indirectly connected to the other through the central
computer.
Ring – In the ring network topology, the workstations are connected in a closed-loop configuration.
Adjacent workstation pairs are directly connected. Other pairs of workstations are indirectly
connected, passing data through one or more intermediate nodes.
Mesh – Mesh network topology has two forms – full and partial mesh. In the full mesh topology,
each workstation is directly connected. In the partial mesh topology, some workstations are
connected to all the others, and some are connected only to the other nodes with which they
exchange more data.
Fully Connected Mesh (Left) and Partial Mesh Network Topology (Right)
Tree – The tree network topology uses two or more star networks connected to each other. The
central computers in star networks are connected to the main bus. Thus, a tree network is a bus
network of star networks.
Tree Network Topology
Ans. Clients and servers are separate logical entities that work together over a network to accomplish
a task.
A client application is the element of communication that requests or requests a network service, for
example, accessing a web page, or downloading a file, or sending an email.
A server application is the element of communication that responds to customer requests, providing
the required service, that is, sending the web page or the requested file or email.
The client-server model is used by computer applications such as email, the worldwide web, and
network printing.
Ans. Frame Relay is a data link layer digital packet-switched network protocol technology designed
to connect local area networks (LANs) and transfer data over wide area networks (WANs). Frame
Relay shares some of the same underlying technology as X.25.
It is based on the older X.25 packet-switching technology that was designed to transmit analogue
data as voice conversations. Unlike X.25, which was designed for analogue signals, Frame Relay is a
fast packet technology, which means that the protocol does not attempt to correct errors. It is often
used to connect LANs with main backbones, as well as in public wide area networks and in private
network environments with leased T-1 lines. It requires a dedicated connection during the
transmission period and is not ideal for voice or video, which require a constant stream of
transmissions.
Frame Relay is a connectionless service, which means that every data packet that passes over
the network contains address information
Frame Relay is a service that is provided with a variety of speeds from 56 Kbs to 25 Mbs.
Although the speeds most used for the service are currently 56 Kbs and 1,544 Mbs
The frames are of variable length and go up to 4,096 bytes
Frame Relay is considered a broadband ISDN service
It operates at high speed (1,544 Mbps to 44,376 Mbps).
It operates only on the physical and data link layers. Therefore, it can be easily used on the
Internet.
It has a large frame size of 9000 bytes. Therefore, it can accommodate all local area network
frame sizes.
Frame Relay can only detect errors (at the data link layer). But there is no flow control or
error control. It operates in the data link layer.
Ans. Frame Relay supports the multiplexing of traffic from multiple connections over a shared
physical link. It uses hardware components that include router frames, bridges, and switches to pack
data into individual frame relay messages. Each connection uses a 10-bit Data Link Connection
Identifier (DLCI) for unique channel addressing. There are two types of connections:
Permanent Virtual Circuits (PVCs) for persistent connections are intended to be maintained
for long periods even if data is not actively transferred.
Switched Virtual Circuits (SVCs) for temporary connections that last only one session.
Frame Relay then places the data in a variable-size unit called a frame and leaves any necessary error
correction (data retransmission) until the endpoints, speeding up the overall transmission of data.
Frame Relay
Ans. A MAC (Media Access Control) address is the unique 48-bit hardware address of a LAN card,
usually stored in the ROM of the network adapter card.
The MAC address is a unique identifier that manufacturers assign to a network card or device. It is
also known as a physical address represented by hexadecimal digits. Each MAC address is unique
worldwide and, in theory, they are fixed for each device.
Each MAC address includes six pairs of numbers. The first three pairs help to identify the
manufacturer and the next three to the specific model. It is important to bear in mind that a computer
may have a variety of hardware to connect to networks; thus, it is common to have a MAC address
for Ethernet, one for Wi-Fi, and another for Bluetooth.
Ans. Beaconing is the process that allows a network to self-repair network problems. This is among
the important networking interview questions and you must prepare for the related terminologies as
well.
When a signal travels through a medium from one point to another, it may change the form or shape
of the signal. This is known as distortion.
Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.
Ans. An Internet Protocol address (IP address) is a numerical unique address of a device in a
network. IP is a datagram-oriented connectionless protocol, therefore each packet must contain a
header with the source IP address, the destination IP address, and other data in order to be delivered
successfully.
Private IP Address – A private IP address is a set of numbers that are assigned to each
computer or system, connected to a private network. An example of a private IP address is
your mobile phone or your home router which have a default local address.
Public IP Address – Public IP addresses are global addresses, visible to anyone browsing
the Internet. A user just needs an internet connection to connect to such devices.
Ans. Finding the IP address of a website or a domain is not a tricky task and involves the below steps
–
Logically the bandwidth of our network will be decisive for its quality and speed. The more
bandwidth we have, the better, since the faster we can transfer data.
Ans. A firewall is a network security system, responsible to manage network traffic. It uses a set of
security rules to prevent remote access and content filtering. Firewalls are used to protect the systems
or networks from viruses, worms, malware, etc. Firewalls are usually of two types –
Physical – A physical firewall or hardware firewall is a physical device, sits between the external
network and the server. They analyze incoming traffic and filter out any threats to the device. Widely
used in institutions and large companies.
Logical – A logical or software firewall can exist anywhere on the subnet and protects hosts
anywhere on the subnet without rewiring. They only protect the computer on which they are
installed, and in many cases, they are integrated into the operating system itself.
You can also explore: What are the Different Types of Firewalls?
Ans. This is among the popularly asked networking interview questions. The firewall ‘listens’ for
what information packets are trying to leave or enter the computer system. Blocking can be done
based on various criteria, such as the IP to which they are destined, the type of port used to send
them, or the application of origin.
One of the most complex aspects of using firewalls lies in their configuration, in deciding what types
of connections are blocked and which ones are not.
Q21. What are the major types of networks?
Ans. There are two major type of networks: Server-based network and Peer-to-peer network.
Ans. There are three essential topologies: Star, Bus, and Ring.
Ans. In a static IP address, a computer (or another device) is always configured to use the same IP
address, whereas, in a dynamic IP address, the IP address can change periodically and is managed by
a centralized network service.
Simplex
Half-duplex
Full-duplex
Ans. Routers connect two or more network segments. These intelligent network devices store
information in their routing tables such as paths, hops, and bottlenecks. They determine the most
accurate data transfer paths and operate in Open Systems Interconnection (OSI) Network Layer.
Inter-network communication
Best path selection
Packet forwarding
Packet filtering
For more information, you can also explore: What is Router in Computer Networks?
You can also explore: Network Devices in Computer Networks and Its Types
Q26. What are the criteria for the best path selection of a router?
Ans. The source route is defined as a sequence of IP addresses that are used to identify the route of a
datagram. You can also involve the source route in the IP datagram header.
Q28. What is the difference between ‘standard’ and ‘extended’ ACL (access control
list)?
Ans. Standard ACLs are source-based, whereas extended ACLs are source- and destination-based.
Ans. RAS (Remote Access Services) refers to any combination of hardware and software to enable
remote access to tools or information that typically reside on a network of IT devices.
Q31. Mention the different network protocols that are supported by Windows
RRAS services?
Ans. Following are the three main network protocols supported by Windows RRAS services:
NetBEUI
TCP/IP
IPX
Ans. You can achieve a secure computer network in the following ways:
Modems
Satellites
PlasmaCAM
Shielding wire
Embedded Processor
Computer Memory
Open connectors
Q35. What are proxy servers and how do they protect computer networks?
Ans. Proxy servers prevent external users from identifying the IP addresses of an internal network.
They make a network virtually invisible to external users, who cannot identify the physical location
of a network without knowledge of the correct IP address.
Ans. Nodes – Devices or data points on a more extensive network are known as nodes. They are
individual parts of a larger data structure and contain data. They also link other nodes.
Links- A link is the physical and logical network component for interconnecting hosts or nodes in a
network. It is a physical communication medium such as a coaxial cable or optical fibre.
Ans. SLIP or Serial Line Interface Protocol was developed during the early UNIX days and it is used
for remote access.
SLIP does not provide error detection as it relies on higher-layer protocols for it. Therefore, SLIP
alone is not successful on an error-prone dial-up connection. However, it is still useful to test the
operating system’s response capabilities under load (looking at ping flood statistics).
Interviewers often ask such networking interview questions and you must prepare for such
abbreviations.
Ans. TCP/IP is the short form of the Transmission Control Protocol / Internet Protocol. It is a set of
protocol layers designed to facilitate data exchange on heterogeneous networks.
Learn all about Cisco Certifications, their Scope, and Benefits, read our blog – what are Cisco
Certifications?
Layer Description
It enables hosts to insert packets into the network and have them
Internet delivered to the destination, on the same network, or another
remote network.
Ans. It is one of the most commonly asked networking interview questions. The OSI (Open Systems
Interconnection) Model consists of seven layers:
Layer Description
It is the lowest layer of the OSI Model. It transmits raw unstructured data
bits over a communication channel. The Physical layer is responsible for
Physical the actual physical connection between the devices. While receiving
data, the Physical layer gets the signal received, converts it into 0s and
1s, and sends them to the Data Link layer.
Data Link At this layer, the directly connected nodes perform node-to-node data
transfer where data is packaged into frames. This layer also corrects
errors that occurred at the Physical layer. Data Link Layer is divided into
two sub-layers :
The Network layer is responsible for transmitting data from one host to
the other located in different networks. It receives frames from the data
Network
link layer and delivers them to their intended destinations based on the
addresses contained inside the frame. It also takes care of packet routing.
The transport layer is responsible for managing the delivery and error-
Transport checking of data packets. It ensures the end-to-end delivery of the
complete message.
Presentatio This layer extracts data from the application layer and manipulates it as
n per the required format to transmit over the network.
At the Application layer, both the end-user and the application layer
interact directly with the software application. This layer acts as a
Application
window for the application services to access the network and for
displaying the received information to the user.
Ans. The OSI model was introduced in February 1980. In 802.XX, ‘80’ is named for the year 1980,
and ‘2’ is named for the month of February.
Application conflicts
Client-server problems
Configuration error
Protocol mismatch
Security issues
User policy & rights issues
This question is among the basic networking interview questions and you must prepare for such
questions.
Ans. Encryption is the process of changing data from its original readable format to an unreadable
format, thus ensuring network security. It requires the user to use a secret key or password to decrypt
the data.
Encryption is not only useful for communications, but also in any case where you want to protect
sensitive information. Thus, it is possible to encrypt the information contained in disks, folders or
even individual files, to prevent unauthorized access. Then, in addition to the benefit of protecting
the privacy of users, data encryption prevents other types of attacks such as identity theft, or bank
fraud, in addition to providing a protection mechanism against the theft or loss of devices with
sensitive information.
Ans. The client-server model or architecture is a communication framework for network processes.
This framework is distributed among service requestors, clients, and service providers and offers
them transparent access to applications, data, computing services or any other resource of the
workgroup and/or across the organization, on multiple platforms.
Client-Server Functions
Ans. TELNET is a client-service protocol on the internet or local area network, allowing a user to log
on to a remote device and have access to it. This is among the most commonly asked networking
interview questions. Technically, it is a bidirectional interactive text-oriented communication facility,
which uses a virtual terminal connection.
Ans. In networking, RIP is an abbreviation for Routing Information Protocol. It is a simple protocol
that exchanges information between the routers.
Ans. It is the mode of communication between two devices. Here the data flows bi-directionally but
simultaneously. A perfect example of a half-duplex is a walkie-talkie.
Ans. It is a mode of communication between two devices and the data flow is bi-directional too, but
the flow is simultaneous. One of the examples of full-duplex is a telephone.
Ans. Netstat is a command-line utility program that provides information about the current
Transmission Control Protocol /Internet Protocol (TCP/IP) settings of a connection.
Ans. The processes on each machine that communicate at a given layer are called the peer-peer
process.
Q53. What is anonymous FTP?
Ans. With the help of an anonymous FTP, users can be granted access to files in public servers.
Users can log in as anonymous guests, thus the name.
Ans. It stands for Network Address Translation and is a protocol that allows a network device,
usually a firewall, to assign a public address to a computer/s inside a private network.
Syntax: It refers to the structure or format of the data and their order of presentation.
Timing: Timing refers to two characteristics, which include the timing of data sending and
the speed of data sending.
Such common networking interview questions are often asked by the interviewers.
Ans. NIC is the abbreviation for Network Interface Card. It is a peripheral card with electronic
circuitry. It is attached to a PC and connects to a network. NIC has its own MAC address and this
identifies a PC on the network.
Ans. Transmission – A process of sending and receiving data between source and destination, in
only one way. It is regarded as the physical movement of data.
Communication – A process of sending and receiving data between source and destination, in both
ways.
Ans. Network Address Translation (NAT) is a protocol used to convert the IP address of the
computer network into a local network to a single IP address. It takes all your local network devices
and provides a single IP address to share a single connection to the internet. NAT is used router,
computer, firewall in a local network.
Ans. Short form for Network Operating System. Specialized software that provides connectivity to a
computer such that it can communicate with other computers and devices on a network.
Ans. IDEA is the abbreviation for International Data Encryption Algorithm. It is the replacement for
the Data Encryption Standard (DES).
Ans. Brouter is a device that functions as both a bridge and a router. It forwards data within the
networks and also routes data to individual systems in a network.
An antivirus is a software that protects a computer from any malicious software, virus, spyware, or
adware.
You may consider such networking interview questions to be basic, but such questions are the
favourite of interviewers as interviewees often leave behind such networking interview questions
while preparing.
Ans. We will install an OS and updated antivirus in a system that is free of any viruses, and then
connect the hard drive of the infected system as a secondary drive. The hard drive will then be
scanned and cleaned. Data can now be copied into the system.
Ans. ‘ipconfig’ is an acronym for Internet Protocol Configuration. We use ipconfig on Microsoft
Windows to view and configure the network interface. It displays all TCP/IP network summary
information available on a network and helps to modify the DHCP protocol and DNS settings.
Ans. It is an acronym for Interface Configuration and is used on Linux, Mac, and UNIX operating
systems. ‘ifconfig’ configures and controls the TCP/IP network interface parameters from Command
Line Interface while allowing the user to check the IP addresses of these network interfaces.
Ans. Semantic gap is a difference between high-level programming sets in various computer
languages and the simple computing instructions used by microprocessors.
Ans. This is one of the important networking interview questions that you must prepare for your
interview. The main difference between a Domain and a Workgroup is where do the computer
networks belong to. If it is a home network, then computers will be a part of a workgroup, and if it’s
a workplace network, then the computers will be a part of a domain.
Below are some of the major differences between a Domain and a Workgroup:
Domain Workgroup
The computers in a domain have a The computers in the workgroup have their
centralized database. own local database.
Computers can be on a different local All computers must be on the same local area
network. network.
It is used by large public and business A workgroup is better suited for fewer
networks. computers.
Ans. BGP or Border Gateway Protocol is a protocol used to transfer data and information between
different host gateways or autonomous systems.
Ans. Round Trip Time or RTT is the time taken to send a message from one end of a network to the
other and back.
Ans. Localhost is the standard hostname given to the machine, and it is represented by the IP address
127.0.0.1. Therefore, we can say that 127.0.0.1 and localhost are the same thing.
Q76. Which are the most typical functional units of the client/server applications?
Ans. The most typical functional units of the client/server applications are –
Ans. Triggers are event-driven specialized procedures and are managed by database management
systems. It is capable of performing complex actions and uses procedural languages full throttle.
Ans. A gateway is a hardware device that is connected to two or more networks. It may be a router,
firewall, server, or any other similar device, and is capable of regulating traffic in the network.
For more information, you can also explore: What is a Gateway in networking?
Ans. A gateway sends the data between two dissimilar networks, while a router sends the data
between two similar networks.
Q80. What is a Virtual Private Network (VPN)? What are the advantages
of using a VPN Connection?
Ans. A VPN or Virtual Private Network is an encrypted connection (secure tunnel) built on the
internet from a device to a network. It helps in the creation of a protected network between different
networks using the internet (public network), ensuring that sensitive data is safely transmitted. This
makes it difficult for third parties to gain unauthorized access, track your activities online, or steal
data. By using the VPN, a client can connect to the organization’s network remotely.
Remote Access
Anonymity
Enhanced Security
Improved Performance
Anonymity
Network Scalability
A Remote Access VPN securely connects a device (endpoints like laptops, tablets, or smartphones)
outside the corporate office. It allows a client to associate with a private network and access every
one of its resources and services remotely. The connection between the private network and the user
happens securely through the Internet. It is a low-cost solution and is helpful for both business and
home users.
Site-to-Site or Router-to-Router Virtual Private Network:
This VPN is mostly used in large organizations with branches in different locations to connect the
network of one office to another in different locations. It has two sub-categories:
Intranet VPN: Intranet VPN allows several offices of the same company to connect using
the Site-to-Site VPN type. It is commonly used for connecting remote offices in different
geographical locations using shared infrastructure (internet connectivity and servers) with
the same accessibility policies as a private WAN (wide area network).
Extranet VPN: Extranet VPN allows companies to use Site-to-site VPN type to connect to
the office of another company. It uses shared infrastructure over an intranet, suppliers,
customers, partners, etc., and connects them using dedicated connections.
Ans. EGP stands for Exterior Gateway Protocol. It is used to exchange net-reachability information
between Internet gateways within the same or different autonomous systems. EGP is the protocol of
the routers. It is used to identify the set of networks that you will be able to reach within or via each
independent system.
Ans. 10Base-T specifies data transfer rate, i.e., 10Mbps. Here the usage of the term ‘Base’ defines
‘Baseband’ and not ‘Broadband’. T denotes the type of cable, which is a twisted pair.
Session Layer
Presentation Layer and
Application Layer
Q85. What is Piggy Backing?
Ans. It is the process of gaining access to a restricted communications channel by using an already
established session by another user. This technique is known to improve the efficiency of the
bidirectional protocols.
Ans. It is a serial mode of transmission. It is the process of data transmission, where every character
is a self-contained unit. Each character in asynchronous transmission has its start and stop bits, along
with an uneven interval between them.
Ans. Synchronous transmission refers to continuous data streaming in the form of signals,
accompanied by regular timing signals. These signals are generated by the external clocking
mechanism and ensure that senders and receivers are in synchrony.
Ans. Process Sigma measures the frequency of a task that is performed without any error. It is
expressed as a number of standard deviations on a normal distribution.
Ans. Failure Mode Effect and Analysis or FMEA is a qualitative and systematic tool to identify
potential failure modes in a system, the reasons, and their effects.
Ans. It refers to a centralized infrastructure for distributing different routes and data to various
networks. Backbone networks connect LANs and WANs and also handles the management of
bandwidth and multiple channels.
Q92. What is OSPF?
Ans. OSPF is an abbreviation for Open Shortest Path First. It is a routing protocol that uses a link-
state routing (LSR) algorithm to find out the best possible path for data exchange.
Ans. Following are the five different ranges of addresses in the classes of the internet:
Ans. Datalink protocols are defined as the sets of requirements used to implement the data link layer.
There are the following categories of Data Link protocols:
Synchronous Protocols
Asynchronous Protocols
Bit Oriented protocols
Character Oriented Protocols
Ans. The Network Layer or OSI Layer 3 provides services for exchanging individual sections of data
over the network between identified end devices. To perform this end-to-end transport Layer 3 uses
four basic processes:
Addressing
Encapsulation
Routing
Decapsulation
Ans. Following are the different types of links used to build a computer network:
Cables
Wireless Links
Last-Mile Links
Leased Lines
Q98. Mention the types of wires used for data transmission in UTP cable.
Ans. There are four types of wires used for data transmission in UTP cable, which is wire 1, 2, 3, and
6. Where wires 1 and 2 are used to transmit the data while wires 3 and 6 are used to receive the data.
Ans. RG59 and RG6 cables are not used in the computer network. These cables are made for the
cable TV network.
Ans. 10Base2 is defined as part of the IEEE 802.3a standard, specifies data transmission speeds of
10Mbps and a total segment length of 185 meters using RG-58 coaxial cable. The 10Base2 standard
specifies a physical bus topology and uses BNC connectors with 50-ohm terminators at each end of
the cable. One of the physical ends of each segment must be grounded.
Ans. Fibre optical cable is the cable used in the 10BaseFL network.
Ans. 10Base2 networks allow a maximum of five segments with only three of those segments
populated. Each of the three populated segments can have a maximum of 30 nodes attached.
Ans. The NIC stands for the network interface controller. NIC is a device or module that controls and
configures the interface of a processor system to a network or other interconnection. There are many
different types of interfaces in electronic systems. NICs generally configure, maintain the current
state, handle faults, and provide algorithm implementation to successfully transfer data to and from
the interface.
You can also explore: What is Network Interface Card And Its Type
Ans. Following are the five application that uses TCP port:
FTP
POP
SSH
SMTP
Telnet
Q107. What is the 5-4-3 rule? In which architectures do we use the 5-4-3 rule?
Ans. In the 5-4-3 rule, there is a maximum of five segments in a network that are connected with four
repeaters. It is used in 10Base2 and 10Base5 Ethernet architectures. In this rule, only three segments
can be populated with nodes.
Q108. Name the measurement unit used to measure the transmission speed of
Ethernet?
Ans. Mbps is the measurement unit used to measure the transmission speed of Ethernet.
Q109. Name the switching method used to explore the destination Mac address.
Ans. The switching method that is used to explore the destination Mac address is Cut Through.
Ans. One access list can be used per interface and per protocol.
Q112. What is the possible way to convert the user data from DTE to the WAN
Service Form?
Ans. To convert the user data from DTE to WAN Service Form, we can use the Modem, CSU/DSU,
and TA/NT1.
Ans. WAN services obtained by Cisco routers are switched services where protocols are used to
connect end to end devices and Interface front end.
Ans. In the Sliding Window, the sender and receiver must deal with the manageable sequence
numbers. This abstract concept defines the range of sequence numbers with the concern of sender
and receiver.
Q116. What standard color sequences are used for a straight-through cable?
Ans. Standard colour sequences used for a straight-through cable are Orange/white, orange,
green/white, green, blue/white, blue, brown/white, brown.
Ans. Simple Mail Transfer Protocol (SMTP) is a protocol used to move all internal mail across
different networks. It works with Mail Transfer Agent (MTA) and provides the mail transmission on
the TCP/IP protocol stack.
Ans. Wireless keyboards, smartphones, TV remotes, wireless printers, BlueTooth, firewire, ZigBee,
Wireless USB, Wibree are some of the examples of WPAN.
Q123. Name the layers of the TCP IP protocol suite that are involved in a link-layer
switch.
Ans. In TCP IP protocol, a link-layer switch is involved with the data-link layer and physical layer.
Q124. What is MAU?
Ans. Multistation Access Unit(MAU) is a device used to connect multiple network stations in star
topology in the form of a ring which is also known as a token ring network.
Q125. Mention the maximum number of networks and hosts used in classes A, B,
and C networks.
Ans. The maximum number of networks and hosts used in class A, B, and C networks are:
Ans. A bit rate is the number of bits transmitted during one second, whereas, baud rate refers to the
number of signal units per second that are required to represent those bits.
Baud rate = bit rate / N, where N is the no. of bits represented by each signal shift.
Ans. It is a project started by IEEE to set standards to enable intercommunication between equipment
from a variety of manufacturers.
Ans. ICMP (Internet Control Message Protocol) is a network layer protocol of the TCP/IP suite used
by hosts and gateways to send notification of datagram problems back to the sender.
Ans. This is one of the important networking interview questions. The differences between TCP and
UDP are:
For more information, you can also explore: TCP vs UDP: What’s the Difference?
TCP is more reliable as it guarantees the UDP is less reliable as the delivery of data
delivery of data to the destination router. to the destination cannot be guaranteed
TCP offers extensive error-checking UDP provides only the basic error-
mechanisms. checking mechanism.
Heavyweight. Lightweight.
Packets order can be preserved or can be Packets order is not fixed as all packets
rearranged. are independent of each other.
TCP is used by HTTP, HTTPS, FTP, and UDP is used by protocols like DNS, RIP,
SMTP. SNMP, RTP, TFTP, and NIP.
Ans. DHCP stands for Dynamic Host Configuration Protocol. It is a standardized network protocol
used on Internet Protocol (IP) networks. It is used to auto-configure devices on IP networks enabling
them to use the TCP and UDP-based protocols. The DHCP servers automatically assign IP addresses
to the network devices which reduces the errors caused by the manual allocation of IP addresses.
DHCP is commonly used in networks ranging in size from small home networks to campus
networks.
We hope these networking interview questions will help you to crack your next hardware and
networking interview.